Carsten Rudolph

Orcid: 0000-0001-9050-5675

According to our database1, Carsten Rudolph authored at least 127 papers between 1991 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
TechnoSapiens: merging humans with technology in augmented reality.
Vis. Comput., February, 2024

SAFE: Advancing Large Language Models in Leveraging Semantic and Syntactic Relationships for Software Vulnerability Detection.
CoRR, 2024

Security and Privacy of 6G Federated Learning-enabled Dynamic Spectrum Sharing.
CoRR, 2024

Exploiting and Securing ML Solutions in Near-RT RIC: A Perspective of an xApp.
CoRR, 2024

SSI4IoT: Unlocking the Potential of IoT Tailored Self-Sovereign Identity.
CoRR, 2024

Fostering Trust in Smart Inverters: A Framework for Firmware Update Management and Tracking in VPP Context.
CoRR, 2024

Deep Learning-Based Out-of-distribution Source Code Data Identification: How Far Have We Gone?
CoRR, 2024

A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection.
CoRR, 2024

Resilient Automated Distributed Device Scheduling in Smart Grids under False Data Injection Attacks.
Proceedings of the IEEE International Conference on Communications, 2024

ALAN: Assessment-as-Learning Authentic Tasks for Networking.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

Utilizing Large Language Models with Human Feedback Integration for Generating Dedicated Warning for Phishing Emails.
Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems, 2024

Towards a Better Understanding of Cyber Awareness Amongst Migrant Communities in Australia.
Proceedings of the Wisdom, Well-Being, Win-Win, 2024

Towards Private Multi-operator Network Slicing.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Access Control, Key Management, and Trust for Emerging Wireless Body Area Networks.
Sensors, December, 2023

DACP: Enforcing a dynamic access control policy in cross-domain environments.
Comput. Networks, December, 2023

Defeating Misclassification Attacks Against Transfer Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Guarding the Grid: Enhancing Resilience in Automated Residential Demand Response Against False Data Injection Attacks.
CoRR, 2023

SePEnTra: A secure and privacy-preserving energy trading mechanisms in transactive energy market.
CoRR, 2023

Security-Aware Provenance for Transparency in IoT Data Propagation.
IEEE Access, 2023

RAI4IoE: Responsible AI for Enabling the Internet of Energy.
Proceedings of the 5th IEEE International Conference on Trust, 2023

FDIAs on Hybrid Trading Transactive Energy Markets: Attacks, Impacts, and Prevention.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2023

Are We Missing the Cybersecurity Factors in Recordkeeping?
Proceedings of the Information for a Better World: Normality, Virtuality, Physicality, Inclusivity, 2023

TimeClave: Oblivious In-Enclave Time Series Processing System.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

2022
Defending Adversarial Attacks via Semantic Feature Manipulation.
IEEE Trans. Serv. Comput., 2022

Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models.
IEEE Trans. Serv. Comput., 2022

OCTOPUS: Overcoming Performance and Privatization Bottlenecks in Distributed Learning.
IEEE Trans. Parallel Distributed Syst., 2022

Adversarial Detection by Latent Style Transformations.
IEEE Trans. Inf. Forensics Secur., 2022

A Blockchain-Based Consent Mechanism for Access to Fitness Data in the Healthcare Context.
IEEE Access, 2022

R-Net: Robustness Enhanced Financial Time-Series Prediction with Differential Privacy.
Proceedings of the International Joint Conference on Neural Networks, 2022

Latent Space-Based Backdoor Attacks Against Deep Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2022

Introduction to the Minitrack on International Perspectives for Cybersecurity.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Cybersecurity Maturity in the Pacific Islands - Informing a Regional CERT Framework.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

False Data Injection Attack Detection for Secure Distributed Demand Response in Smart Grids.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

NOTE: Unavoidable Service to Unnoticeable Risks: A Study on How Healthcare Record Management Opens the Doors of Unnoticeable Vulnerabilities for Rohingya Refugees.
Proceedings of the COMPASS '22: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, Seattle, WA, USA, 29 June 2022, 2022

Email Summarization to Assist Users in Phishing Identification.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Blockchain Applications in Smart Grid.
Proceedings of the ACSW 2022: Australasian Computer Science Week 2022, Brisbane, Australia, February 14, 2022

Privacy of Fitness Applications and Consent Management in Blockchain.
Proceedings of the ACSW 2022: Australasian Computer Science Week 2022, Brisbane, Australia, February 14, 2022

2021
Robust Training Using Natural Transformation.
CoRR, 2021

OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning.
CoRR, 2021

Decentralized Policy Information Points for Multi-Domain Environments.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Authentication and Access Control in 5G Device-to-Device Communication.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Impact analysis of false data injection attacks in transactive energy market-based micro-grid systems.
Proceedings of the 2021 IEEE PES Innovative Smart Grid Technologies, 2021

Risk and Compliance in IoT- Health Data Propagation: A Security-Aware Provenance based Approach.
Proceedings of the IEEE International Conference on Digital Health, 2021

We Can Pay Less: Coordinated False Data Injection Attack Against Residential Demand Response in Smart Grids.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
Adversarial Defense by Latent Style Transformations.
CoRR, 2020

Defending Adversarial Attacks via Semantic Feature Manipulation.
CoRR, 2020

Generating Semantic Adversarial Examples via Feature Manipulation.
CoRR, 2020

Cybersecurity in Pacific Island nations.
Commun. ACM, 2020

Privacy-Preserving Data Generation and Sharing Using Identification Sanitizer.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Attribute-Based Data Access Control for Multi-Authority System.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Prov-IoT: A Security-Aware IoT Provenance Model.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Inherent Vulnerability of Demand Response Optimisation against False Data Injection Attacks in Smart Grids.
Proceedings of the NOMS 2020, 2020

Robust Demand Response for Device Scheduling under False Data Injection Attacks in Smart Grids.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2020

OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

PART-GAN: Privacy-Preserving Time-Series Sharing.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2020, 2020

What Information is Required for Explainable AI? : A Provenance-based Research Agenda and Future Challenges.
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020

2019
Defending Against Misclassification Attacks in Transfer Learning.
CoRR, 2019

A Dynamic Access Control Policy Model for Sharing of Healthcare Data in Multiple Domains.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Logic for Secure Stratified Systems and its Application to Containerized Systems.
Proceedings of the 18th IEEE International Conference On Trust, 2019

High Impact False Data Injection Attack against Real-time Pricing in Smart Grids.
Proceedings of the 2019 IEEE PES Innovative Smart Grid Technologies Europe, 2019

A Dynamic Cross-Domain Access Control Model for Collaborative Healthcare Application.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

P-STM: Privacy-Protected Social Tie Mining of Individual Trajectories.
Proceedings of the 2019 IEEE International Conference on Web Services, 2019

Blockchain based Dynamic Patient Consent: A Privacy-Preserving Data Acquisition Architecture for Clinical Data Analytics.
Proceedings of the 40th International Conference on Information Systems, 2019

Towards an Improved Understanding of Human Factors in Cybersecurity.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

Fuzzy Logic Application to Link National Culture and Cybersecurity Maturity.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

Bootstrapping Trust in a "Trusted" Virtualized Platform.
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, 2019

Towards a Blockchain based Fall Prediction Model for Aged Care.
Proceedings of the Australasian Computer Science Week Multiconference, 2019

Can I Trust the Data I See?: A Physician's Concern on Medical Data in IoT Health Architectures.
Proceedings of the Australasian Computer Science Week Multiconference, 2019

2017
Security knowledge representation artifacts for creating secure IT systems.
Comput. Secur., 2017

Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining Pools.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

An implementation of access-control protocol for IoT home scenario.
Proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science, 2017

2016
Recent developments in example-based texture synthesis for graphics rendering.
Proceedings of the 46. Jahrestagung der Gesellschaft für Informatik, 2016

Exploring the Space of Digital Evidence - Position Paper.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
An Integrated Security and Systems Engineering Process and Modelling Framework.
Comput. J., 2015

On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Distributed security management for the IoT.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

2014
Digital Evidence and Forensic Readiness (Dagstuhl Seminar 14092).
Dagstuhl Reports, 2014

A security engineering process for systems of systems using security patterns.
Proceedings of the IEEE International Systems Conference, 2014

Trusted neighborhood discovery in critical infrastructures.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

CeMoSS - Certification and Model-Driven Development of Safe and Secure Software.
Proceedings of the Software Engineering 2014, Fachtagung des GI-Fachbereichs Softwaretechnik, 25. Februar, 2014

Security foundation for a distributed cabin core architecture.
Proceedings of the 2014 Information Security for South Africa, 2014

Integrity based relationships and trustworthy communication between network participants.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Integrating trust establishment into routing protocols of today's MANETs.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

LMM - A Common Component for Software License Management on Cloud.
Proceedings of the SECRYPT 2013, 2013

Building Secure Systems Using a Security Engineering Process and Security Building Blocks.
Proceedings of the Software Engineering 2013 - Workshopband (inkl. Doktorandensymposium), Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar, 2013

ZeMoSS-Workshop: Zertifizierung und modellgetriebene Entwicklung sicherer Software.
Proceedings of the Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar, 2013

Seizure of digital data and "selective suppression" of digital evidence.
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013

On the automatic establishment of security relations for devices.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Demo: Zero touch configuration.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Trusted Virtual Machine Management for Virtualization in Critical Environments.
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013

Enhancing Security Testing via Automated Replication of IT-Asset Topologies.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Zertifizierung und modellgetriebene Entwicklung sicherer Software (ZeMoSS 2012).
Proceedings of the Software Engineering 2012: Fachtagung des GI-Fachbereichs Softwaretechnik, 27. Februar, 2012

Redefining Security Engineering.
Proceedings of the 5th International Conference on New Technologies, 2012

Establishing Trust between Nodes in Mobile Ad-Hoc Networks.
Proceedings of the Trusted Systems, 4th International Conference, 2012

On the Creation of Reliable Digital Evidence.
Proceedings of the Advances in Digital Forensics VIII, 2012

Trusted service access with dynamic security infrastructure configuration.
Proceedings of the 18th Asia-Pacific Conference on Communications, 2012

2011
Formal Notions of Trust and Confidentiality- Enabling Reasoning about System Security.
J. Inf. Process., 2011

Trust Areas: A Security Paradigm for the Future Internet.
Proceedings of the Security and Trust Management - 7th International Workshop, 2011

Secure Digital Chains of Evidence.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

A Property Based Security Risk Analysis Through Weighted Simulation.
Proceedings of the Information Security South Africa Conference 2011, 2011

2010
First Theoretic Analysis of Magnetic Drug Targeting in the Lung.
IEEE Trans. Biomed. Eng., 2010

Trust in Peer-to-Peer Content Distribution Protocols.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Security Digital Evidence.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010

A Formal Notion of Trust - Enabling Reasoning about Security Properties.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

Privacy in Distributed Commercial Applications.
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010

2009
Verification of S&D Solutions for Network Communications and Devices.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

On the Security Validation of Integrated Security Solutions.
Proceedings of the Emerging Challenges for Security, 2009

Towards a Generic Process for Security Pattern Integration.
Proceedings of the Database and Expert Systems Applications, 2009

Reliable Identities Using Off-the-Shelf Hardware Security in MANETs.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Secure Web Service Workflow Execution.
Proceedings of the 3rd International Workshop on Views On Designing Complex Architectures, 2008

Trust in Business Processes.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2007
Covert Identity Information in Direct Anonymous Attestation (DAA).
Proceedings of the New Approaches for Security, 2007

Security Evaluation of Scenarios Based on the TCG's TPM Specification.
Proceedings of the Computer Security, 2007

Facilitating the Use of TPM Technologies through S&D Patterns.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

2005
On the security of fair non-repudiation protocols.
Int. J. Inf. Sec., 2005

Security analysis of efficient (Un-)fair non-repudiation protocols.
Formal Aspects Comput., 2005

On a formal framework for security properties.
Comput. Stand. Interfaces, 2005

Specification and automated processing of security requirements (SAPS'05).
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), 2005

Abstractions Preserving Parameter Confidentiality.
Proceedings of the Computer Security, 2005

2003
Parameter-Confidentiality.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", INFORMATIK 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29, 2003

A business process-driven approach to security engineering.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Authenticity and Provability - A Formal Framework.
Proceedings of the Infrastructure Security, International Conference, 2002

Security Analysis of (Un-) Fair Non-repudiation Protocols.
Proceedings of the Formal Aspects of Security, First International Conference, 2002

Role Based Specification and Security Analysis of Cryptographic Protocols Using Asynchronous Product Automata.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

1998
A Formal Model for Systematic Design of Key Establishment Protocols.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

Analyse kryptographischer Protokolle mittels Produktnetzen basierend auf Modellannahmen der BAN-Logik.
GMD research series 13/1998, GMD, ISBN: 978-3-88457-333-4, 1998

1991
Ein wissensbasierter Ansatz zur Konfigurierung rechnergestützter Messsysteme.
PhD thesis, 1991


  Loading...